(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*

This guide provides a more detailed description of the syntax that is supported along with examples.

This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.

Concept Search - What can I type?

For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.

Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.

SECRET MESSAGE AREA WITH PASSWORD PROTECTION

Publishing Venue

Motorola

Related People

Ramanujam Satagopan: AUTHOR

Abstract

Conventionally, messages in a pager are accessed by only one user when the pager is not shared. It is typical, however, to share a pager among a few peo- ple in places such as factories and hospitals. Thus, when sharing a pager, secret areas with password protection would be desirable as a feature.

Copyright

Motorola Inc. November 1995

Country

United States

Language

English (United States)

This text was extracted from a PDF file.

At least one non-text object (such as an image or picture) has been suppressed.

This is the abbreviated version, containing approximately
50% of the total text.

Page 1 of 3

m MoIylRoLA

V Technical Developments

SECRET MESSAGE AREA WITH PASSWORD PROTECTION

by Ramanujam Satagopan

Conventionally, messages in a pager are accessed by only one user when the pager is not shared. It is typical, however, to share a pager among a few peo- ple in places such as factories and hospitals. Thus, when sharing a pager, secret areas with password protection would be desirable as a feature.

For this feature, portions of memory in a mes- sage RAM are set aside as secret areas for users. Access to a secret area is protected by a password known only to a user. For example, from a normal screen, the user can activate a button to get to a private screen corresponding to the secret area or back from the private screen to the normal screen. When in the private screen, operations of the pager and display of information can be similar to the nor- mal screen. Transferring messages between the nor- mal screen and the private screen is possible through an icon at a main menu within the normal screen or the private screen.

Figure 1 shows a flow diagram of transferring a message to the secret area horn the normal screen. Once transferred, the message will no longer be seen in the normal screen, If there is not enough mem- ory in the secret area, an error message will be dis- played by the pager. A similar transfer procedure applies for transferring a message from the private screen to the normal screen except that a password is not required in this case.

In the secret area, the user will be able to per- form all operations with messages as in the normal

screen. To view secret messages, the user, upon entering a correct password at a password screen and, thereafter, at a confirmation prompt to transfer a message, has to press a READ key. These steps will only show a status screen containing the secret messages.

At the password screen, when no key action is activated after a period of time, programmably predetermined, the pager returns to a normal status screen regardless ofwhether the user has logged on to the secret area or not. Also, any type of screen timeout when in the private screen will set the pager to the normal status screen.

Figure 2 shows how the password can be set by the user with keys available on the pager. Each key is assigned a numeric value such as "1:' "2:' and "31' Combination of these three numbers determines a total number of combinat...